An aggregate of all of GoVanguard’s InfoSec & Cybersecurity related Posts, News, Threats and Data Feeds.

image
European law-enforcement officials have shut down an encrypted Android-based communications platform used exclusively by criminals to plot murders, traffic illegal drugs, commit money laundering and plan other organized crimes. An international law-enforcement team from the France and the Netherlands cracked the encryption of EncroChat, a secure mobile messaging service that was “one of the largest providers of encrypted communications,” according to the U.K.’s National Crime Agency (NCA). U.K. officials had been investigating the platform and nefarious activities of the criminals using it since 2016 through Operation Venetic, working alongside international law-enforcement agencies to share technical expertise and intelligence. Two months ago investigators in France and the Netherlands cracked the network’s encryption, allowing law enforcement to listen in to criminal communications about selling and trafficking drugs, laundering money and murdering rivals, authorities said. “The infiltration of this command-and-control communication platform for the U.K.’s criminal marketplace is like having an inside person in every top organized crime group in the country,” NCA director of investigations Nikki Holland said in a statement. “This is the broadest- and deepest-ever U.K. operation into serious organized crime. More than one murder was disrupted as a result, authorities said. “A specialist NCA team, working closely with policing partners, has prevented rival gangs carrying…

Source

Today with the increase in online transactions, we have also been witnessing a huge spike in cyber crimes. It is therefore essential to secure online transactions and keep confidential data like the PIN (Personal Identification Number) secure. For these reasons the PCI Security Standards Council, a global forum responsible for online payment security laid down PCI PIN Security Standards to protect PIN data. In the set Standards they have defined a complete set of requirements and testing procedures to be followed for securing the management, processing, and transmission of personal identification number (PIN) data during online and offline payment card transaction processing at ATMs and attended and unattended point-of-sale (POS) terminals. 

To learn more about the Standards and Requirements, you can join us on our live webinar “PCI PIN Security Requirements and Standards”On 9th July. We will have an interactive live Q&A session wherein we can discuss and clear your doubts on PCI PIN. 

Topics Covered

  1. Introduction to PCI PIN
  2. Scope and Applicability to PCI PIN
  3. Basics of Cryptography
  4. PCI PIN Certification Process
  5. QnA

Registration Links

India: 2 PM :- Register Here

London: 3 PM:- Register Here

PST: 11 AM:- Register Here

The post FREE WEBINAR – PCI PIN Security Requirements & Applicability appeared first on Global Compliance News.

Source

image
A U.S. congressman is asking Amazon if it plans to place a moratorium on police access to its Ring smart doorbell video footage, citing concerns around surveillance and racial bias. The inquiry comes on the heels of Amazon saying it would halt the sale of its Rekognition facial recognition platform to police departments (mimicking similar moves by Microsoft and IBM) in June. But Rep. Raja Krishnamoorthi (D-Ill.), the chairman of the Subcommittee on Economic and Consumer Policy, argued that Amazon’s commitment to joining “the fight against systemic racism and injustice” is undermined as long as it continues its existing partnership with police departments for Ring doorbell access. “The Subcommittee is concerned that these partnerships give police a much wider system of surveillance than police legally could build themselves,” according to the letter, sent Wednesday. “Law enforcement agencies can view videos shared by users in the Neighbors app, request video from users through the Neighbors Portal, or request video directly from Ring. Once law enforcement agencies have access to consumers’ data, Ring has made it clear that the agencies can use, store, and share that data however they want.” The partnerships between Ring and law enforcement began in 2018 and has extended to now include at least 1,300 police departments across the U.S. The partnership allows homeowners to provide voluntary access to camera footage to officers, via a Neighbors app. This is a companion app to…

Source

In PrestaShop from version 1.5.3.0 and before version 1.7.7.6, there is a stored XSS when using the name of a quick access item. The problem is fixed in 1.7.7.6.

Source

In PrestaShop from version 1.5.0.0 and before version 1.7.7.6, the authentication system is malformed and an attacker is able to forge requests and execute admin commands. The problem is fixed in 1.7.7.6.

Source

In PrestaShop from version 1.7.0.0 and before version 1.7.6.6, if a target sends a corrupted file, it leads to a reflected XSS. The problem is fixed in 1.7.6.6

Source

In PrestaShop from version 1.6.0.1 and before version 1.7.6.6, the dashboard allows rewriting all configuration variables. The problem is fixed in 1.7.6.6

Source

In PrestaShop from version 1.5.0.0 and before 1.7.6.6, there is information exposure in the upload directory. The problem is fixed in version 1.7.6.6. A possible workaround is to add an empty index.php file in the upload directory.

Source

image
Trojans, backdoors and droppers, oh my: These are the top three malware types being analyzed by threat intelligence teams, according to statistics out on Thursday. According to anonymized statistics from requests to the Kaspersky Threat Intelligence Portal, almost three quarters (72 percent) of the analyzed malicious files fell into those three categories. The portal is a resource where users can submit a hash, IP address, domain or URL to find out whether it’s malicious. “Malicious activity detection is the first step in an attack investigation,” Kaspersky explained in it report. “To develop response and remediation measures, security analysts need to identify the target of attack, the origin of a malicious object, its popularity etc.” The threats that the malicious objects processed by the portal turned out to be most often associated with trojans. These boobytrapped software threats account for a quarter (25 percent) of the submissions. Backdoors, which offer persistent remote access to devices or networks by cyberattackers, accounted for nearly a quarter – 24 percent. And finally, trojan-droppers, which are first-stage malware samples that initially land on a victim’s machine before fetching a main payload, account for 23 percent. Source: Kaspersky These do not, however, line up with the most common types of malware in circulation today. “Trojans are usually the most widespread type of malware,” said the firm. “However, backdoors and trojan-droppers are not as common,…

Source

image
Apache Guacamole, a popular infrastructure for enabling remote working, is vulnerable to a slew of security bugs related to the Remote Desktop Protocol (RDP), researchers have warned. Admins should update their systems to avoid attacks bent on stealing information or remote code-execution. “Once in control of the gateway, an attacker can eavesdrop on all incoming sessions, record all the credentials used, and even start new sessions to control the rest of the computers within the organization,” explained Eyal Itkin, researcher from Check Point, in a posting on Thursday. “When most of the organization is working remotely, this foothold is equivalent to gaining full control over the entire organizational network.” Apache Guacamole has more than 10 million Docker downloads globally, and is also embedded into other products like Jumpserver Fortress, Quali and Fortigate. Guacamole gateways essentially secure and handle connections from users coming from outside the corporate perimeter. “In essence, an employee uses a browser to connect to his company’s internet-facing server, goes through an authentication process, and gets access to his corporate computer,” said Itkin. “While the employee only uses his browser, the Guacamole server selects one of the supported protocols (RDP, VNC, SSH, etc.) and uses an open-source client to connect to the specific corporate computer. Once connected, the Guacamole server acts as a middle-man that relays the events back and forth while…

Source